Showing 61 - 80 results of 773 for search '"The Alarm"', query time: 0.05s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72

    Footstep and Vehicle Detection Using Slow and Quick Adaptive Thresholds Algorithm by Gökhan Koç, Korkut Yegin

    Published 2013-10-01
    “…Footstep alarm condition up to 8 meters and vehicle presence alarm condition up to 50 meters were observed. …”
    Get full text
    Article
  13. 73

    A SVDD and K-Means Based Early Warning Method for Dual-Rotor Equipment under Time-Varying Operating Conditions by Zhinong Jiang, Minghui Hu, Kun Feng, Hao Wang

    Published 2018-01-01
    “…The alarm threshold of each interval of operating conditions is obtained. …”
    Get full text
    Article
  14. 74

    Application of HEC-RAS in 2D Dam Break Simulation-A Case Study of Hongqi Reservoir by HUANG Binbin, GE Liming, XU Xian, WANG Yue

    Published 2021-01-01
    “…This paper simulates the dam break of Hongqi reservoir by HEC-RAS software,studies the discharge hydrograph of breach,the local flow pattern downstream of the breach,the propagation of dam break flood wave in flood area and the life loss caused by dam break flood,discusses the distribution of flood velocity and flood inundation depth,and draws the risk map of inundation depth.After analysis of the discharge hydrograph of breach,it is found that the larger the instantaneous breach size is,the greater the initial discharge is,and the faster the initial discharge hydrograph changes,while the smaller the breach size is,the slower the discharge hydrograph changes.Based on the evaluation of life loss caused by dam break flood,the loss of life and its severity coefficient are lower when the alarm time is longer.When there is no alarm,the life loss reaches 210.When the alarm time is 1 hour,the loss of life is obviously reduced,and the life loss is 0 when the alarm time is 3.5 hours.…”
    Get full text
    Article
  15. 75

    Effect Analysis of Optical Masking Algorithm for GEO Space Debris Detection by Sijie Kong, Jin Zhou, Wenli Ma

    Published 2019-01-01
    “…A method with high detection rate, low false-alarm rate, and low computational cost is presented for removing stars and noise and detecting space debris with signal-to-noise ratio (SNR>3) in consecutive raw frames. …”
    Get full text
    Article
  16. 76

    Power Grid Fault Diagnosis Method Using Intuitionistic Fuzzy Petri Nets Based on Time Series Matching by Mingyue Tan, Jiming Li, Xiangqian Chen, Xuezhen Cheng

    Published 2019-01-01
    “…First, the alarm hypothesis sequence and the real alarm sequence are constructed using the alarm information and the general grid protection configuration model, and the similarity of the two sequences is used to calculate the timing confidence. …”
    Get full text
    Article
  17. 77

    Anomaly intrusion detection based on modified SVM by Hui ZHANG, Cheng LIU

    Published 2016-08-01
    “…A modified SVM multi-classification algorithm integrated with discriminant analysis (D-SVM) was pro-posed,which could solve the problem of low detection accuracy and high false alarm rate caused by unbalanced datasets.For a multi-classification problem could be divided into several binary classification problems,D-SVM could not only have the virtue of high detection accuracy,but also have a low false alarm rate even confronted with unbalanced datasets.Experiments based on KDD99 dataset verify the feasibility and validity of the integrated ap-proach.Results show that when confronted with multi-classification problems,D-SVM could achieve a high detec-tion accuracy and low false alarm rate even when SVM alone fails because of the unbalanced datasets.…”
    Get full text
    Article
  18. 78

    Research and Application of a Multi-Agent-Based Intelligent Mine Gas State Decision-Making System by Yi Sun, Xinke Liu

    Published 2025-01-01
    “…The system aims to enhance the accuracy of gas over-limit alarms and improve the efficiency of generating judgment reports. …”
    Get full text
    Article
  19. 79

    Auditory risk recognition is socially transmitted across territory borders in wild birds by Jakub Szymkowiak

    Published 2024-03-01
    “…Abstract Prey species commonly assess predation risk based on acoustic signals, such as predator vocalizations or heterospecific alarm calls. The resulting risk-sensitive decision-making affects not only the behavior and life-history of individual prey, but also has far-reaching ecological consequences for population, community, and ecosystem dynamics. …”
    Get full text
    Article
  20. 80

    IoT-Based Solar Energy Measurement and Monitoring Model by L. Chitra, N. Vasantha Gowri, M. Maheswari, Dipesh Uike, N. R. Medikondu, Essam A. Al-Ammar, Ahmed Sayed Mohammed Metwally, Ataul Islam, Abdi Diriba

    Published 2022-01-01
    “…In this context, with the help of cloud computing-based Internet of things (IOT), the industrial power stations, high-voltage substations, low-voltage networks, power stations that comply with legal regulations on safety from electricity, electrical installations for machinery, alarm systems, fire alarm systems, cathodic corrosion protection mechanisms in oil tanks and pipelines, emergency power supply installations, electrical installations in buildings, and gas alarm systems are inspected and documented.…”
    Get full text
    Article